Conflicker 2.0? The threat is back with a P2P makeover
The Wily worm uses P2P for new instructions; other clues link it to Waledec and the Storm worm
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
The Wily worm uses P2P for new instructions; other clues link it to Waledec and the Storm worm
Both Symantec and an analyst speak to the benefits of getting in on this hot market now
Companies may still be spending on security, but it will remain a challenge to get them to open their wallets. Find out where the security spend is going, and how you can get a piece
One analyst warns Twitter, Facebook and YouTube are the “wild, wild west” of the Internet, and advises caution
Security and access vendor focuses on better integration and process automation
Canada a major parter of a network designed to quickly react to cybercrime
Canada a major force behind a network designed to quickly react to cybercrime
Workflow enablement programs to help partners push Altiris Version 7.0
The security networking vendor expects its channel to find success with its new approach to security software marketing and architecture
Concerns about the security of cloud computing services may be overstated, panelists at IDC’s Cloud Computing Forum said
The security vendor has created a new business unit to focus on the SaaS opportunity, and help partners become security managed service providers
VAR partners can access tested and approved third-party security solutions through McAfee program
New version of Finjan’s Secure Web Gateway appliance helps lower business costs
Defensio acquisition presents more opportunities for channel partners, Canadian country manager says
A McAfee-sponsored report says, with companies laying off tech-savvy employees, data theft is a rising concern